c:\projects\am\plugins\wmi\Release\DT.pdb
Static task
static1
Behavioral task
behavioral1
Sample
daa116bfa54dcf3c73cc1c754b695b50fc786ee04b452b29b554b0a19d1cdbfb.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
daa116bfa54dcf3c73cc1c754b695b50fc786ee04b452b29b554b0a19d1cdbfb.dll
Resource
win10v2004-20240508-en
General
-
Target
daa116bfa54dcf3c73cc1c754b695b50fc786ee04b452b29b554b0a19d1cdbfb
-
Size
116KB
-
MD5
82caea2f1dac909947a8e9638f41eeee
-
SHA1
b4dde93fd4cf02e8f38a74d3957b4c23564797c6
-
SHA256
daa116bfa54dcf3c73cc1c754b695b50fc786ee04b452b29b554b0a19d1cdbfb
-
SHA512
f70f683c2b6a65a18dd9418b742ffabbab73a2a5dbff2530edef1fd362614beb42a3a4cac3b21fd937f6b80f86831672611f158dc160b678d7b45b364c3f4da5
-
SSDEEP
3072:XW1Wc60AcCfRWy5Cudq5f+gZUaeQWmx1t9cwz:Kz6Lr0JJ5NZUZC1t9c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource daa116bfa54dcf3c73cc1c754b695b50fc786ee04b452b29b554b0a19d1cdbfb
Files
-
daa116bfa54dcf3c73cc1c754b695b50fc786ee04b452b29b554b0a19d1cdbfb.dll regsvr32 windows:4 windows x86 arch:x86
a00965ca078dc616936c736924df1bd6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
qt-mt332
??4QString@@QAEAAV0@PBD@Z
??4QString@@QAEAAV0@ABV0@@Z
??0QString@@QAE@ABV0@@Z
??0QString@@QAE@PBD@Z
??1QString@@QAE@XZ
?ascii@QString@@QBEPBDXZ
kernel32
GetLocaleInfoA
GetThreadLocale
InterlockedIncrement
InterlockedDecrement
lstrlenW
GetShortPathNameA
GetModuleFileNameA
WideCharToMultiByte
GetLastError
lstrcpyA
lstrlenA
IsDBCSLeadByte
MultiByteToWideChar
lstrcpynA
lstrcmpiA
DeleteCriticalSection
InitializeCriticalSection
lstrcatA
FreeLibrary
SizeofResource
LoadResource
GetACP
LoadLibraryExA
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
LoadLibraryA
OutputDebugStringA
Sleep
InterlockedExchange
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
GetVersionExA
RaiseException
DebugBreak
CloseHandle
HeapAlloc
GetCurrentProcess
HeapFree
GetProcessHeap
FindResourceA
user32
CharNextA
advapi32
RegDeleteValueA
RegQueryInfoKeyA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
shell32
SHGetFileInfoA
ole32
CoTaskMemFree
StringFromCLSID
StringFromGUID2
CoTaskMemAlloc
CoTaskMemRealloc
CoGetClassObject
CoCreateInstance
oleaut32
SysAllocStringLen
VariantChangeType
VariantClear
VariantInit
SysStringLen
LoadRegTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
RegisterTypeLi
VarUI4FromStr
shlwapi
PathFindExtensionA
msvcp70
?_Nomemory@std@@YAXXZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
msvcr70
_onexit
__dllonexit
_CRT_RTC_INIT
__security_error_handler
_callnewh
_open
_fstat
_close
isprint
_vsnprintf
time
localtime
strncpy
fopen
fprintf
fclose
_iob
strlen
strcat
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_initterm
_adjust_fdiv
_stricmp
__CxxFrameHandler
memcmp
??_V@YAXPAX@Z
memset
_mbschr
??3@YAXPAX@Z
_except_handler3
memcpy
_CxxThrowException
_purecall
realloc
free
malloc
wcscmp
_wcsicmp
sprintf
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
??0exception@@QAE@XZ
_getpid
_snprintf
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ